Apple’s T2 chip on the new Macs perform a wide array of tasks to secure the machine from various hardware- and software-based attacks. The fact that the T2 chip can do so much is also potentially its weakness, as it opens up the machine’s attack surface.
A deputy U.S. attorney general said that Russia and other nations stonewall cybercrime investigations and called for international cooperation.
Amazon's AWS cloud platform now has a security feature that will block all public access to S3 data storage buckets.
In the coming weeks, Firefox will begin to warn users when they visit a site that has been part of a data breach.
Attacks on the global supply chain—sabotaging hardware components, installing malware or backdoors in software—are stuff security nightmares are made of. The ICT Task Force, formed by the Department of Homeland Security, meets to help companies manage their risk.